Ethics and Social Engineering Exercises

Security professionals often find themselves tasked with performing different social engineering exercises. Whether overseeing these projects for our organization or executing them for another, many considerations go into every exercise. What is the goal? Who will be...

Layer8 Conference – Recon Done Right: Physical Edition

Zlata Pavlova & Rob CurtinSeufert – “Recon Done Right – Physical Edition” Have you ever walked through a swamp at 3 am? Have you driven around blocks trying to mark what cars are located in the parking lot? Have you sat in the reeds taking pictures of cameras and...

SolarWinds Supply Chain Attack Leads To Large-scale Exploitation

Last week our industry exploded with a staggering amount of data on the Solarwinds Orion monitoring software which compromised with a backdoor between May and June of 2020. We’d like to provide a little background and some distilled information for our readers. About...

InGuardians Press Release – InGuardians’ Live Online Training launches with top-ranking ‘Assessing and Exploiting Control System and IIoT’ class taught by Justin Searle

FOR IMMEDIATE RELEASE   “InGuardians’ Live Online Training launches with top-ranking ‘Assessing and Exploiting Control System and IIoT’ class taught by Justin Searle” Seattle, WA – April 27, 2020  For more than 20 years, InGuardians’ core has been top-tier...